Linux Security
    Linux Security
    Linux Security

    Debian: phpmyadmin fix several vulnerabilities DSA-1370-2

    Date
    3193
    Posted By
    Several remote vulnerabilities have been discovered in phpMyAdmin, a program to administrate MySQL over the web. The PMA_ArrayWalkRecursive function in libraries/common.lib.php does not limit recursion on arrays provided by users, which allows context-dependent attackers to cause a denial of service (web server crash) via an array with many dimensions.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1370-2                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                            Thijs Kinkhorst
    September 10th, 2007                    https://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : phpmyadmin
    Vulnerability  : several
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CVE-2006-6942 CVE-2006-6944 CVE-2007-1325 CVE-2007-1395 CVE-2007-2245
    
    The update for the oldstable distribution was incorrectly installed into
    the archive. This update provides corrected packages. For reference the
    original advisory text:
    
    Several remote vulnerabilities have been discovered in phpMyAdmin, a
    program to administrate MySQL over the web. The Common Vulnerabilities
    and Exposures project identifies the following problems:
    
    CVE-2007-1325
    
        The PMA_ArrayWalkRecursive function in libraries/common.lib.php
        does not limit recursion on arrays provided by users, which allows
        context-dependent attackers to cause a denial of service (web
        server crash) via an array with many dimensions.
    
        This issue affects only the stable distribution (Etch).
    
    CVE-2007-1395
    
        Incomplete blacklist vulnerability in index.php allows remote
        attackers to conduct cross-site scripting (XSS) attacks by
        injecting arbitrary JavaScript or HTML in a (1) db or (2) table
        parameter value followed by an uppercase  end tag,
        which bypasses the protection against lowercase .
    
        This issue affects only the stable distribution (Etch).
    
    CVE-2007-2245
    
        Multiple cross-site scripting (XSS) vulnerabilities allow remote
        attackers to inject arbitrary web script or HTML via (1) the
        fieldkey parameter to browse_foreigners.php or (2) certain input
        to the PMA_sanitize function.
    
    CVE-2006-6942
    
        Multiple cross-site scripting (XSS) vulnerabilities allow remote
        attackers to inject arbitrary HTML or web script via (1) a comment
        for a table name, as exploited through (a) db_operations.php,
        (2) the db parameter to (b) db_create.php, (3) the newname parameter
        to db_operations.php, the (4) query_history_latest,
        (5) query_history_latest_db, and (6) querydisplay_tab parameters to
        (c) querywindow.php, and (7) the pos parameter to (d) sql.php.
    
        This issue affects only the oldstable distribution (Sarge).
    
    CVE-2006-6944
    
        phpMyAdmin allows remote attackers to bypass Allow/Deny access rules
        that use IP addresses via false headers.
    
        This issue affects only the oldstable distribution (Sarge).
    
    For the stable distribution (etch) these problems have been fixed in
    version 2.9.0.3-4.
    
    For the old stable distribution (sarge) these problems have been fixed in
    version 2.6.2-3sarge5.
    
    For the unstable distribution (sid) these problems have been fixed in
    version 2.10.1-1.
    
    We recommend that you upgrade your phpmyadmin packages.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        https://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge5.dsc
          Size/MD5 checksum:      896 7d2144286ddad9d5a8a88af1660bf34f
        https://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge5.diff.gz
          Size/MD5 checksum:    41685 71832d082f9aad134786fb51c522e5f3
        https://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2.orig.tar.gz
          Size/MD5 checksum:  2654418 05e33121984824c43d94450af3edf267
    
      Architecture independent components:
    
        https://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.6.2-3sarge5_all.deb
          Size/MD5 checksum:  2769794 b7f2545109e3904bb7e8eb49b09e6f7c
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
      Source archives:
    
        https://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-4.dsc
          Size/MD5 checksum:     1011 26baccf88fa7d3b00f4802e46d8d0053
        https://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-4.diff.gz
          Size/MD5 checksum:    46886 0f377a70b327c65f53ff6895856d18d6
        https://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1.orig.tar.gz
          Size/MD5 checksum:  3500563 f598509b308bf96aee836eb2338f523c
    
      Architecture independent components:
    
        https://security.debian.org/pool/updates/main/p/phpmyadmin/phpmyadmin_2.9.1.1-4_all.deb
          Size/MD5 checksum:  3605594 05f19efce1cb5b31a8f1161a01dbe158
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.